Team-Fly |
Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Slots : 1 | |
Table of Contents | |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] daily hack probes Dalnet 2nd dangerous executables Dark Avenger Dark Avenger virus Data Fellow data segment instruction pointers datafiles dates, checking DBLBUFF.SYS DBLSPACE.BIN 2nd DCC (Direct Client to Client) DDE (Dynamic Data Exchange) DDoS (distributed denial of service) de Vitry, David DEBUG.EXE 2nd 3rd 4th decompression decryption Deep Throat Trojan horse Deep ThroatTrojan horse DeepBO Trojan horse DeepThroat Trojan horse Def Con hacker convention default system shares defense plan, malicious mobile code communication, importance of creating deployment distributing updates end user education foreign computers and networks goals implementation management buy-in new assets, protecting objectives quality assurance team technology inventory testing updating and reviewing 2nd writing defense strategy, recommendations Define virus Delete.bat file Delphi Delta Trojan horse DeltaSource Trojan horse Den Zuk boot virus denial of service (DoS) attacks 2nd 3rd 4th Department of Defense Department of Energy Der Spaeher Trojan horse 2nd DESKTOP.INI destination port number device drivers 2nd 3rd 4th Devil Trojan horse DFS (Distributed File System) DHCP DHTML (Dynamic HTML) DHTML Edit control, ActiveX DHTMLED.OCX digital certificates 2nd digital copiers Digital Equipment Corporation digital fingerprint 2nd digital ID digital signature digital signing Digital VAX host email system DIR command DIR-2 virus direct action Trojan horses Direct Client to Client (DCC) disabling virus services Disk Manager Disk Quotas DISKDIAG.EXE DISKPROBE.EXE DISKSAVE.EXE distributed attacks distributed computing distributed denial of service (DDoS) Distributed File System (DFS) Distributed.net DLL (dynamic linking library) DNS (domain naming servers) DNS Spoofing Document.ExecCommand( ) documents, saving in rich text format Doly Trojan horse Domain Administrators Domain Name System (DNS) domain naming servers (DNS) domains DoS (denial of service) attacks DOS batch files DOS boot virus prefix (Boot) DOS command interpreters DOS computer viruses .EXE and .COM files all Windows platforms, effect upon boot viruses detecting file- infecting viruses hardware manipulation history interrupts memory-resident viruses nonmemory resident viruses PC boot sequence programming skills required protecting computers from removing Windows 3.x, interaction with Windows 9x, interaction with Windows NT, interaction with DOS error messages DOS Program Information files DOS Virtual Machine (DVM) DOS Virtual Machine (VM or DVM) DOSSTART.BAT 2nd 3rd dotless IP address exploit Doubleclick.net Download Demon Dr. Watson for Windows 2nd 3rd drive A booting, disabling drive A, booting from 2nd Driver Signing Driver Verifier DRIVES.BAT dropper programs droppers DRVSPACE.BIN 2nd DRWTSN32 dual-boot partitions dual-boot systems Dump command DUNPassword Trojan horse DVM (DOS Virtual Machine) Dynamic Data Exchange (DDE) Dynamic HTML Dynamic HTML (DHTML) dynamic linking library (DLL) dynamic VxDs |
Team-Fly |
Top |